Hacking-Economic Espionage. Aksana Chornenkaya, Sherin Hassan, & Meagan Moore. Goals of Presentation. Explain how cyber hacking and economic espionage has evolved over the past century Examples of hacker groups Examples of victims of hacking and economic espionage Acts and Regulations
Aksana Chornenkaya, Sherin Hassan, & Meagan Moore
“A person who finds weaknesses in a computer system and exploits it.”
“Someone involved in the exploration of technology.”
Companies that implement strong IT controls, physical access controls, nondisclosure agreements and background checks make it harder for hackers or employees to breach systems and acquire proprietary information.